Skip to content

Conversation

zirain
Copy link
Member

@zirain zirain commented Jul 31, 2025

No description provided.

@zirain zirain requested review from a team as code owners July 31, 2025 03:41
@istio-policy-bot
Copy link

😊 Welcome! This is either your first contribution to the Istio documentation repo, or
it's been a while since you've been here. A few things you should know:

  • You can learn about how we write and maintain documentation, our style guidelines,
    and the available web site features by visiting Contributing to the Docs.

  • In the next few minutes, an automatic preview of your change will be built with
    a full copy of the istio.io website. You can find this preview by clicking on
    the Details link next to the deploy/netlify entry in the status section of this
    page.

  • We care about quality, so we've put in place a number of checks to ensure our documentation
    is top-notch. We do spell checking, sanitize the Markdown, ensure all hyperlinks point to a
    valid location, and more. If your PR doesn't pass one of these checks, you'll see a red X in the
    lint_istio.io entry in the status section. Click on the Details link to get a list of the
    problems with your PR. Fix those problems and push an update; this will automatically re-run the
    tests. Hopefully this time everything will be perfect!

  • Once your changes are accepted and merged into the repository, they will initially show up
    on https://preliminary.istio.io. The changes will be published to https://istio.io
    the next time we do a major release (which typically happens every 3 months or so).
    To publish them sooner, add a cherrypick/release-x.xx label, where x.xx is the current
    release of Istio.

Thanks for contributing!

Courtesy of your friendly welcome wagon.

@istio-testing istio-testing added the size/L Denotes a PR that changes 100-499 lines, ignoring generated files. label Jul 31, 2025
@zirain zirain mentioned this pull request Jul 31, 2025
52 tasks
Copy link
Member

@dhawton dhawton left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Partial pass on release notes, will continue reviewing later.

Copy link
Member

@dhawton dhawton left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Finished first pass over the change notes.


- **Added** support for native `nftables` when using Istio sidecar mode. This update makes it possible to use `nftables`
instead of iptables to manage network rules, offering more efficient approach to traffic redirection for pods and
services. To enable the `nftables` mode, use `--set values.global.nativeNftables=true` at the time of installation. ([Issue #56487](https://github.com/istio/istio/issues/56487))
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Should we add a note here that only debug images currently support this mode?

PS: Following is the tracker for including the nftables-slim in distroless images - istio/istio#57237

Copy link
Member

@dhawton dhawton Aug 5, 2025

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

A note for future, that should be part of the release notes yaml in the PR.

Copy link
Contributor

@craigbox craigbox left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Sorry, forgot to sent this yesterday

Comment on lines 12 to 14
## Multiple certificate types support in Gateway

Istio now supports configuring multiple certificate types (such as RSA and ECDSA) simultaneously in Gateway resources.
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Classic Gateway or Kubernetes Gateway?

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Both

Copy link
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Added Add support for multiple server certificates in gateway (istio & gateway api)

it seems like to be both for the release notes.

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

yes. it is both

- **Added** certificate revocation list (CRL) support for plugged-in CAs, enabling Istio to watch for `ca-crl.pem` files and
automatically distribute CRLs across all namespaces in the cluster. This enhancement allows
proxies to validate and reject revoked certificates, strengthening the security posture of service mesh deployments
using plugged-in CAs. ([Issue #56529](https://github.com/istio/istio/issues/56529))
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Should this point to istio/istio#56308 where the design doc is referenced?

Copy link
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

this's generated from the release notes in istio/istio, I'm fine if you want to highlight the design doc.

Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

We also don't link to pull requests, only issues. It's best to put design docs in the issue.

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

There is no obvious issue; the issue linked is for something after the fact. 56529 didn't tell me anything; I had to work backwards to figure out what the thing was.

Copy link
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

At least, it linked to the implement PR, and there's a design in the PR description.

@keithmattix
Copy link
Contributor

keithmattix commented Aug 8, 2025

@istio/release-managers-1-27 Something I just ran into: after istio/istio#56048, using an older istioctl or helm chart version with new istio-cni images will cause ambient enablement to break completely because the defaults are set in the install mechanism. Maybe something to call out in release notes? Maybe it's too much, but it took me a while to debug so I figured I'd bring it up.

Sidenote: we may want to consider patching the istio-cni code itself so that the default doesn't result in ambient being unusable...probably a good thing to target for a 1.27.1 release?

@howardjohn
Copy link
Member

@istio/release-managers-1-27 Something I just ran into: after istio/istio#56048, using an older istioctl or helm chart version with new istio-cni images will cause ambient enablement to break completely because the defaults are set in the install mechanism. Maybe something to call out in release notes? Maybe it's too much, but it took me a while to debug so I figured I'd bring it up.

Sidenote: we may want to consider patching the istio-cni code itself so that the default doesn't result in ambient being unusable...probably a good thing to target for a 1.27.1 release?

I've run into the same but its a 100% invalid way to install Istio which has been broken for ~80% of versions (usually broken in different ways) so its not a new thing. I have also ran into this exact CNI issue and struggled to debug, though since I often pull latest

- **Added** certificate revocation list (CRL) support for plugged-in CAs, enabling Istio to watch for `ca-crl.pem` files and
automatically distribute CRLs across all namespaces in the cluster. This enhancement allows
proxies to validate and reject revoked certificates, strengthening the security posture of service mesh deployments
using plugged-in CAs. ([Issue #56529](https://github.com/istio/istio/issues/56529))
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

There is no obvious issue; the issue linked is for something after the fact. 56529 didn't tell me anything; I had to work backwards to figure out what the thing was.

Copy link

linux-foundation-easycla bot commented Aug 11, 2025

CLA Signed

The committers listed above are authorized under a signed CLA.

  • ✅ login: zirain / name: zirain (3077597)

@zirain zirain force-pushed the release-notes-1.27 branch from 3e436e4 to 631aaa8 Compare August 11, 2025 12:18
@zirain zirain requested review from craigbox and dhawton August 11, 2025 12:18
@dhawton
Copy link
Member

dhawton commented Aug 11, 2025

/test easycla

@istio-testing
Copy link
Contributor

@dhawton: The specified target(s) for /test were not found.
The following commands are available to trigger required jobs:

/test doc.test.dualstack
/test doc.test.multicluster
/test doc.test.profile-ambient
/test doc.test.profile-default
/test doc.test.profile-demo
/test doc.test.profile-minimal
/test doc.test.profile-none
/test gencheck
/test lint

The following commands are available to trigger optional jobs:

/test update-ref-docs-dry-run

Use /test all to run the following jobs that were automatically triggered:

gencheck_istio.io
lint_istio.io
update-ref-docs-dry-run_istio.io

In response to this:

/test easycla

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository.

@dhawton
Copy link
Member

dhawton commented Aug 11, 2025

/easycla

@zirain
Copy link
Member Author

zirain commented Aug 11, 2025

what happen to [email protected]?

Copy link
Member

@dhawton dhawton left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Couple nits

@dhawton
Copy link
Member

dhawton commented Aug 11, 2025

what happen to [email protected]?

Nothing. That's still my primary GH email address. Not sure what error easycla is having, nothing has changed irt my GH account in several years. Seems to also not like a commit co-authored by Keith.. so easycla/GH issue maybe? or it's not us.

@zirain
Copy link
Member Author

zirain commented Aug 11, 2025

what happen to [email protected]?

Nothing. That's still my primary GH email address. Not sure what error easycla is having, nothing has changed irt my GH account in several years. Seems to also not liking a commit co-authored by Keith.. so easycla/GH issue maybe? or it's not us.

it happen after I merged master, so I think it might not from our side.

@dhawton
Copy link
Member

dhawton commented Aug 11, 2025

Ah yes.. the commit has "2 people and zirain" and the first of the "2 people" is an invalid zirain profile. So something isn't right in those commits.

@zirain
Copy link
Member Author

zirain commented Aug 11, 2025

Ah yes.. the commit has "2 people and zirain" and the first of the "2 people" is an invalid zirain profile. So something isn't right in those commits.

if you don't mind, let me merge them all into one commit to pass it?

@zirain
Copy link
Member Author

zirain commented Aug 11, 2025

/easycla

@zirain zirain force-pushed the release-notes-1.27 branch from 847b47f to 3077597 Compare August 11, 2025 15:35
@istio-testing istio-testing merged commit 315487e into istio:master Aug 11, 2025
6 checks passed
@zirain zirain deleted the release-notes-1.27 branch August 11, 2025 20:37
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
size/L Denotes a PR that changes 100-499 lines, ignoring generated files.
Projects
None yet
Development

Successfully merging this pull request may close these issues.

10 participants